Integrating Security Controls for Host Devices